JÃ¼rgen Weigert discovered a directory traversal flaw in fastjar. Anattacker could create a malicious JAR file which, if unpacked usingfastjar, could write to any files the victim had write access to.(CVE-2006-3619)

These updated packages also fix several bugs, including:

* two debug information generator bugs

* two internal compiler errors

In addition to this, protoize.1 and unprotoize.1 manual pages have beenadded to the package and __cxa_get_exception_ptr@@CXXABI_1.3.1 symbol hasbeen added into libstdc++.so.6.

For full details regarding all fixed bugs, refer to the package changelogas well as the specified list of bug reports from bugzilla.

All users of gcc should upgrade to these updated packages, which containbackported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied. Use Red HatNetwork to download and update your packages. To launch the Red HatUpdate Agent, use the following command:

up2date

For information on how to install packages manually, refer to thefollowing Web page for the System Administration or Customizationguide specific to your system: